2008
DOI: 10.1007/s11036-008-0105-x
|View full text |Cite
|
Sign up to set email alerts
|

Joint Monitoring and Routing in Wireless Sensor Networks Using Robust Identifying Codes

Abstract: Abstract-Wireless Sensor Networks (WSNs) provide an important means of monitoring the physical world, but their limitations present challenges to fundamental network services such as routing. In this work we utilize an abstraction of WSNs based on the theory of identifying codes. This abstraction has been useful in recent literature for a number of important monitoring problems, such as localization and contamination detection. In our case, we use it to provide a joint infrastructure for efficient and robust m… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2012
2012
2024
2024

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(4 citation statements)
references
References 24 publications
0
4
0
Order By: Relevance
“…To remove a vertex, the algorithm decides based on the highest sc(v) value and prevents the vertex that has been added in the previous step from being removed with a tabu list (Lines [12][13][14]. A new vertex is chosen by means of Adding Rule (Lines 15-16).…”
Section: Algorithm 2 Local Search Procedures (Csmax_iter)mentioning
confidence: 99%
See 1 more Smart Citation
“…To remove a vertex, the algorithm decides based on the highest sc(v) value and prevents the vertex that has been added in the previous step from being removed with a tabu list (Lines [12][13][14]. A new vertex is chosen by means of Adding Rule (Lines 15-16).…”
Section: Algorithm 2 Local Search Procedures (Csmax_iter)mentioning
confidence: 99%
“…From a practical viewpoint, the identifying code problem has numerous applications in real-world domains, such as fault diagnosis of multiprocessor systems [1], compact routing in networks [12], emergency sensor networks in facilities [2], and the analysis of secondary RNA structures [13]. Due to its wide applicability, some researchers have focused on designing algorithms and techniques to solve the problem computationally.…”
Section: Introductionmentioning
confidence: 99%
“…Similarly, identifying codes can be applied for locating objects in sensor networks as was suggested by Ray et al in [14]. Moreover, identifying codes find their motivation also in various other applications such as environmental monitoring [2], routing in wireless networks [12], and fire and intruder alarm systems [15].…”
Section: Introductionmentioning
confidence: 99%
“…One of the interests of this notion lies in their applications to the location of threats in facilities [1] and error-detection in computer networks [86]. One can also mention applications to routing [94],…”
Section: Introductionmentioning
confidence: 99%